On Wednesday, the CIA's chief technology officer detailed the Agency's vision for collecting and analyzing all of the information people put on the Internet.

The wide-ranging presentation at GigaOM's Structure:Data conference in New York City came two days after it was reported the spy agency is on the verge of signing a cloud computing contract with Amazon  worth up to $600 million over 10 years  that involves Amazon Web Services helping the CIA build a "private cloud" filled with technologies like big data.

"You're already a walking sensor platform," Hunt said, referring to all of the information captured by smartphones. "You are aware of the fact that somebody can know where you are at all times because you carry a mobile device, even if that mobile device is turned off. You know this, I hope? Yes? Well, you should."

I've got google so screwed up with random searches that I regularly get baby diaper ads. Anyone that knows me, knows I'm a crusty old fart that lives alone and only likes children with rice, or on toast.

On Wednesday, the CIA's chief technology officer detailed the Agency's vision for collecting and analyzing all of the information people put on the Internet.

I figured this out a long time ago. Heck, I'd bet the basic software was written a few years ago.

For instance, it's not all that hard to tie in posters who post from website to facebooks, et al using heuristic assumption building dossiers on everything and everyone. You have the computing power of the federal government it would be easier than pie and just time to develop the platform.

The CIA is the mentally challenged brother Ruprecht compared to the National Security Agency and Defense Intelligence Agency as far as data collection is concerned, unless things have changed drastically.

I am constantly amazed by the idea that people worry (and they should) about CIA/alphabets rifling their porn stash ....

..... when the iphones/ipads/laptops and desktops they do their voodoo on were all built in China. And since we know publicly that some military hardware is compromised with backdoored chips in highly sensitive areas, ya think that maybe Long duc Dong already has all your info?

I figured this out a long time ago. Heck, I'd bet the basic software was written a few years ago

This is the end product of the search for Bin Laden. Bin Laden was smart and did not communicate electronically, but he had associates. They began working on network software that keeps track of all known connections between people, a six degrees of Bin Laden. The same people later worked on social sites like Facebook.

The CIA does not need to spy on Facebook per se, it hacks into the fiber optic cables and reads all the raw packets, and assembles them into emails and phone calls.

"Since you can't connect dots you don't have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever," Hunt said. "It is really very nearly within our grasp to be able to compute on all human generated information."

Hunt, last year your brethren at the NSA denied doing what you're doing. You guys on the same page? Talk to each other much?

"WASHINGTON  What would you think if someone told you personal emails, voicemails and web searches,basically your electronic footprint, could be viewed and stored by a government official?

The feds say that would never happen but some say it is, and by 2013 it will all be funneled into the Utah Data Center.

A more formal description of the center is the First Intelligence Community Comprehensive National Cyber-security Initiative Data Center.

And its huge. One million square feet, all to be filled with more technology and data storage than you could imagine.

It is not a stretch to say Utah is quickly becoming the data center capitol of the U.S., especially now that the state will be home to what some say is one the largest spy centers in the nation. .... "

I’m not concerned about the CIA running through my computer usage. However, we should be concerned about the CIA rummaging through people’s computer usage, who can be compromised into making promises or supporting questionable legislation.

33
posted on 03/23/2013 6:51:27 PM PDT
by Jonty30
(What Islam and secularism have in common is that they are both death cults)

Some of the most technically capable and healthy people of my acquaintance seldom use the Internet and sometimes don’t use it at all for lengthy periods. I use it mostly to gather knowledge in several technical fields (low tech., mostly). Eventually, as more people become more technically skilled in order to get by, few technically inclined people will use the Net much if at all (geological saturation with activities more productive than spying, gossip, etc.).

Low-tech entertainment is even making a comeback in many places (bluegrass and alternative with improvised instruments, anyone?). And the Internet is not the only means for information or communication.

37
posted on 03/23/2013 6:55:04 PM PDT
by familyop
(We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)

Don’t get me wrong. I think we all should be concerned. I just think that while we worry about what the CIA does, we ignore the place that backdoored the chips that allowed the ease of access to begin with.

Not that I don’t think chips weren’t backdoored BEFORE production went offshore mind you. IBM had a cozy relationship with the powers that be from day 1.

LOL!
“They” have always also spied on us!
They just used to make concerted attempts to keep that information very quiet.

I gather they’ve never tried to “recruit” you.

I’ve often wondered about the caliber of people they did successfully manage to recruit.
It’s a civilian Federal government agency, so there is always going to be the ironclad 80/20 rule in play.
About 20% of them are serious about their mission, and manage to do it, in spite of 80% of their clueless and incompetent fellow cohorts and leaders.

The thing about that 20%, is always the question as to who they really work for....

40
posted on 03/23/2013 7:21:10 PM PDT
by sarasmom
(The obvious takes longer to discover for the obtuse.)

Many of those of us who used the Internet during the ‘80s and ‘90s know that data sent was not private. Most of us didn’t have any problem with that then (military offices, universities, assorted nerds). If we want privacy while using the Net, we’ll have to work for that (lobbies, political information, speech, etc.).

42
posted on 03/23/2013 7:25:49 PM PDT
by familyop
(We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)

In 1999 there was a video game called Deus Ex. Set in the future around 2050, it was a secret agent type game where you could be augmented with nanotechnology. The villians were almost every conspiracy group you've ever heard of, all trying to take over the world. While it was fantasy in 1999, it is amazingly creepy how over the years it keeps getting closer to the truth.

Nothing but a big BOAST. WHY? Back when 911 happened it was eventually learned that there was ample data existing regarding the perpetrators but that the CIA and the FBI were unable to see and know about it.

The REASON given at the time was that there was so much data available that it was somewhat IMPOSSIBLE to filter through ALL of it by anyone individually or collectively.

Judging the effectiveness of Government itself I doubt that paradigm has changed. It may have even worsened.

The leftwingtards overestimate the capacity of computers to associate relevant data ~ my own lebenteen hunert and 40 gazillion posts on FR give me and 57 members of the Saudi royal family all the cover we need!

"...the First Intelligence Community Comprehensive National Cyber-security Initiative Data Center. And its huge. One million square feet, all to be filled with more technology and data storage than you could imagine."

Dust off and nuke it from orbit. It's the only way to be sure.

49
posted on 03/23/2013 10:38:29 PM PDT
by Windflier
(To anger a conservative, tell him a lie. To anger a liberal, tell him the truth.)

Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.